Networks

Networks / Featured Blogs

IP Address Management as a Service on the Cloud

Consumption of software as a service with a usage-based business model has gained incredible popularity in recent years. On the other hand, other cloud services such as infrastructure and platform as a service are just starting to pick up. While compute and storage are by the far the most commonly used cloud infrastructure services, few consider core network services such as IP Address Management (IPAM) as something that could be utilized over the cloud. more

The End of HFC and FttN Networks is Approaching

In the global telecoms industry, it looks as though 2013 will be remembered as the year when construction of new greenfield HFC networks came to a halt. Of course, there will still be upgrades to existing networks but the cost of fibre deployment -- linked to its much lower operational cost -- is now convincing cablecos and telcos alike to build new fibre networks wherever possible. This is not necessarily directly driven by customer demand, but by network costs and network efficiencies. more

No Free Super WiFi, But the US Still Needs Improved WiFi Coverage

The FCC has long battled for a more efficient deployment of unused spectrum, endeavouring to adapt rules governing 'white space' TV spectrum (largely gifted to broadcasters years ago, and generally in the 700MHz band) to newly released spectrum (in the 600MHz band). This will considerably improve wireless broadband coverage where it is needed most... Certainly, in the US's disjointed broadband sector there are considerable challenges ahead... more

Cloud Security Hinges on IP Addressing

In the first part of this trilogy, I discussed the importance of automatically provisioned second generation DNS in connection with Software Defined Networking (SDN) and Software Defined Data Centre (SDDC). In the second post, I talked about IP addressing, private enterprise networks, and how DHCP does not meet the requirements of multitenant Infrastructure-as-a-Service (IaaS) cloud environments. I will now wrap up this trilogy by putting these two thesis into real-life context. more

Cable in China

I'm writing this piece on the plane on my way back to Vancouver after a 12-day trip in China. I've written about China before, and every time I go, I understand and appreciate this complex country and culture a little more. If you think China is "up and coming," well, you might want to go and take a look for yourself. To be honest, I think they are already here. more

Maslow’s Hammer Meets the Software Defined Data Center

In my previous post, I talked about the significance of DNS in connection with the Software Defined Data Center (SDDC) and Software Defined Networking. Although the second generation DNS provisioning model I outlined should have seemed straight-forward enough, in real life it is anything but. In my view, the real-world complications of a seemingly trivial issue are largely related to how the network industry approaches IP addressing. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Addressing 2012: Another One Bites the Dust

Time for another annual roundup from the world of IP addresses. What happened in 2012 and what is likely to happen in 2013? This is an update to the reports prepared at the same time in previous years, so lets see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more

DNS Firewalls In Action - RPZ vs. Spam

In general, a network firewall is just a traffic filter... Filtering rules can be anything from "allow my web server to hear and answer web requests but not other kinds of requests" to "let my users Ping the outside world but do not let outsiders Ping anything on my network." The Internet industry has used firewalls since the mid-1980's and there are now many kinds, from packet layer firewalls to web firewalls to e-mail firewalls. Recently the DNS industry has explored the firewall idea and the results have been quite compelling. In this article I'm going to demonstrate a DNS firewall built using RPZ (Response Policy Zones) and show its potential impact on e-mail "spam". more

IPv6 Presents a Security Paradox for the Network

The capabilities IPv6 provides will enhance online security, but the shift to the new Internet address scheme may also present risks if not properly managed. Previously, Internet security was largely an after-thought for the early Internet, as its primary purpose was to facilitate open, end-to-end, any-to-any communications and information exchange for bridging and accelerating research efforts. Today, we have a much more complex online ecosystem that spans billions of users across the globe and serves not only as an engine for e-commerce, but as an engine for all commerce. more